Week 1 (Social Network Analysis) |
Introduction to the course |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Social Network Analysis 101 |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Social Media Implications in Real Life |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Network Metrics |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Research Projects |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 2 (Data Collection) |
Data Collection |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Tutorial: Twitter API |
|
![](./icons/yt.png) |
|
Tutorial: Twitter Search - Getting Historical Tweets |
|
![](./icons/yt.png) |
Tutorial: Twitter Stream - Getting Live Tweets |
|
![](./icons/yt.png) |
Tutorial: Twitter Other Endpoint |
|
![](./icons/yt.png) |
Tutorial: Reddit Data Collection |
|
![](./icons/yt.png) |
Week 3 (NLP for Social Text) |
Social Media Text |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Social Media Text to Insights |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Tutorial: Reading Text, String Manipulation Methods |
|
![](./icons/yt.png) |
![](./icons/code.png) |
Tutorial: Text Processing Libraries: NLTK, Spacy |
|
![](./icons/yt.png) |
Tutorial: Feature Extraction and Tasks |
|
![](./icons/yt.png) |
Week 4 (Fake News) |
Introduction to Fake News |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Types of Fake News |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Concepts related to Fake News |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
How to spot Fake News |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 5 (Fake News) |
Research Methods- Introduction |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Content based Fake News Detection |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Misinformation on WhatsApp and Fake News Datasets |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Practical Solutions to Combat Fake News |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 6 |
Online Social Media and Policing |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Privacy in OSM |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Identity Resolution |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 7 |
Nudges in Social Media |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Cybercrime |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Hatespeech |
![](./icons/ss.png) |
|
|
Week 8 |
Privacy on Social Media |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Information disclosure |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Personally identifiable information |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 9 |
Counducting studies on privacy and social media |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Privacy laws |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Protecting privacy on social media - Anonymization |
![](./icons/ss.png) |
|
|
Week 10 |
Ethics in social media research: Studies of concern |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Ethics in social media research: Solutions |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Bias in social media research |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 11 |
Online Discussions on Divisive Topics - Liniguistic Characterisation |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Effect of Popularity Shocks and Driving the last mile papers |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Graph centrality examples |
![](./icons/ss.png) |
![](./icons/yt.png) |
|
Week 12 |
Paper Discussion: Anticipated versus Actual Effects of Platform Design Change: A Case Study of Twitter's Character Limit & Tampering with the Twitter API |
|
![](./icons/yt.png) |
|
What all has been covered in the course |
|
![](./icons/yt.png) |
|